Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2016-03-03 15:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) ICSS2015-55 |
Attacks against websites are increasing rapidly with the expansion of web services. Diversifying web services make it di... [more] |
ICSS2015-55 pp.47-52 |
NS, IN (Joint) |
2016-03-04 11:00 |
Miyazaki |
Phoenix Seagaia Resort |
Cyber Attack Prediction using News Article Analysis Baatarsuren Munkhdorj, Sekiya Yuji (UTokyo) IN2015-136 |
The common operation of current cyber defense systems is to search a signature of cyber attack by monitoring network tra... [more] |
IN2015-136 pp.165-170 |
ISEC, IT, WBS |
2015-03-02 15:35 |
Fukuoka |
The University of Kitakyushu |
Analysis on isomorphism classes of elliptic curves subjected to GHS attack over prime degree extensions of finite fields with odd characteristic Takayuki Hosogaya (Chuo Univ.), Tsutomu Iijima (Koden), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2014-76 ISEC2014-89 WBS2014-68 |
The GHS attack is known to map the discrete logarithm problem (DLP) in the Jacobian of a curve $C_0$ defined over the $d... [more] |
IT2014-76 ISEC2014-89 WBS2014-68 pp.89-95 |
ICSS |
2014-11-28 10:20 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Detecting Backscatter of DDoS Attacks from Darknet Traffic Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59 |
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] |
ICSS2014-59 pp.49-53 |
ISEC, LOIS, SITE |
2014-11-21 14:40 |
Hyogo |
|
Elliptic curves subjected to the GHS attack over prime degree extension fields in odd characteristic Tsutomu Iijima (Koden), Jinhui Chao (Chuo Univ) ISEC2014-59 SITE2014-50 LOIS2014-29 |
One of the most powerful attacks to elliptic curve and hyperelliptic based cryptosystems defined over an extension of a ... [more] |
ISEC2014-59 SITE2014-50 LOIS2014-29 pp.19-26 |
IA |
2014-11-06 15:30 |
Overseas |
Thailand |
Network Access Control by FPGA-Based Network Switch using HW/SW Cooperated IDS Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2014-52 |
In recent years, cyber targeted attacks are becoming so sophisticated so that countermeasures for them is becoming impor... [more] |
IA2014-52 pp.91-96 |
ICSS |
2013-03-25 14:55 |
Kanagawa |
Yokohama National University |
Network-based classification of remote exploit attacks focusing on UUID Yusuke Takahashi (Yokohama National Univ.), Masaki Kamizono, Yuji Hoshizawa (Securebrain), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-65 |
Remote exploit attacks, which target vulnerabilities of network services, is the class of most common attacks utilized i... [more] |
ICSS2012-65 pp.49-54 |
ISEC |
2010-12-15 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The Mutual Information Analysis using a classification technique of combination Kuniji Wakabayashi, Keisuke Iwai, Takakazu Kurokawa (NDA) ISEC2010-67 |
Against Side channel Attack Standard Evaluation BOard(SASEBO) implemented the AES encryption as hardware circuit, carr... [more] |
ISEC2010-67 pp.13-18 |
ICSS |
2010-11-05 16:25 |
Hiroshima |
Hiroshima City University |
A Shellcode Analysis Method using CPU emulator and Dynamic Binary Instrumentation Chiaki Jimbo, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2010-54 |
The epidemic of Conficker shows that remote exploit attack is still one of the most serious threats on the computer syst... [more] |
ICSS2010-54 pp.59-64 |
MoNA, IPSJ-MBL |
2007-05-18 08:55 |
Okinawa |
Okinawa-seinen-kaikan |
A Classification of Defense Method in Ad-hoc Networks and Proposal for the Anti Attack Ad-hoc Routing Protocol Architecture Takumi Mori, Ikumi Mori, Osamu Takahashi (FUN) |
There are various kinds of attack for ad-hoc networks. Now, many defense methods are defense to detect the attack patter... [more] |
MoMuC2007-15 pp.73-78 |